Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Tamas K. Lengyel"'
Publikováno v:
Digital Investigation. 26:S98-S106
We present research on the limitations of detecting atypical activity by a hypervisor from the perspective of a guest domain. Individual instructions which have virtual machine exiting capability were evaluated, using wall timing and kernel thread ra
Publikováno v:
ACSAC
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 407-417
STARTPAGE=407;ENDPAGE=417;TITLE=34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)
Delft University of Technology
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 407-417
STARTPAGE=407;ENDPAGE=417;TITLE=34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018)
Delft University of Technology
ARM has become the leading processor architecture for mobile and IoT devices, while it has recently started claiming a bigger slice of the server market pie as well. As such, it will not be long before malware more regularly target the ARM architectu
Autor:
Tamas K. Lengyel, George D. Webster, Claudia Eckert, André Ludwig, Zachary D. Hanif, Apostolis Zarras
Publikováno v:
Proceedings of the 19th International Conference on Information Security (ISC)
Delft University of Technology
Lecture Notes in Computer Science ISBN: 9783319458700
ISC
Delft University of Technology
Lecture Notes in Computer Science ISBN: 9783319458700
ISC
The inability of existing architectures to allow corporations to quickly process information at scale and share knowledge with peers makes it difficult for malware analysis researchers to present a clear picture of criminal activity. Hence, analysis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3e2fec8033bebc4f6989ebff088d390b
https://doi.org/10.1007/978-3-319-45871-7_15
https://doi.org/10.1007/978-3-319-45871-7_15
Autor:
Bojan Kolosnjaji, Mykola Protsenko, Benjamin Taubmann, Hans P. Reiser, Andreas Fischer, Waseem Mandarawi, Tamas K. Lengyel, Tilo Müller, Hermann de Meer, Eva Weishäupl, Thomas Kittel
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319261478
OTM Conferences
OTM Conferences
Due to the proliferation of cloud computing, cloud-based systems are becoming an increasingly attractive target for malware. In an Infrastructure-as-a-Service IaaS cloud, malware located in a customer's virtual machine VM affects not only this custom
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7aa08a55bbc14c8e85be4fd7c2ea591b
https://doi.org/10.1007/978-3-319-26148-5_40
https://doi.org/10.1007/978-3-319-26148-5_40
Autor:
Tamas K. Lengyel, Sebastian Vogl, Steve Maresca, Bryan D. Payne, George D. Webster, Aggelos Kiayias
Publikováno v:
ACSAC
Malware is one of the biggest security threats on the Internet today and deploying effective defensive solutions requires the rapid analysis of a continuously increasing number of malware samples. With the proliferation of metamorphic malware the ana
Publikováno v:
DEXA Workshops
As the ARM architecture has become the favored platform for the fastest growing computing segment, the mobile market, establishing a sound security architecture on the platform is paramount. The frightening increase in malware for the Android and iOS
Publikováno v:
Network and System Security ISBN: 9783642386305
NSS
NSS
We present a scalable honeynet system built on Xen using virtual machine introspection and cloning techniques to efficiently and effectively detect intrusions and extract associated malware binaries. By melding forensics tools with live memory intros
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ff0fc164bca5a773013e3aa5544b761
https://doi.org/10.1007/978-3-642-38631-2_13
https://doi.org/10.1007/978-3-642-38631-2_13
Publikováno v:
Delft University of Technology
Proceedings of the 13th Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA)
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319406664
DIMVA
Proceedings of the 13th Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA)
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319406664
DIMVA
Automatic malware classification is an essential improvement over the widely-deployed detection procedures using manual signatures or heuristics. Although there exists an abundance of methods for collecting static and behavioral malware data, there i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8225af47bd420d0dd3e9a1442c6f1da2
https://research.tudelft.nl/en/publications/adaptive-semanticsaware-malware-classification(f14a595d-f9e3-455b-8ef1-543dc0a33eaf).html
https://research.tudelft.nl/en/publications/adaptive-semanticsaware-malware-classification(f14a595d-f9e3-455b-8ef1-543dc0a33eaf).html
Autor:
AFIANIAN, AMIR1 a.afianian@aut.ac.ir, NIKSEFAT, SALMAN1 niksefat@aut.ac.ir, SADEGHIYAN, BABAK1 basadegh@aut.ac.ir, BAPTISTE, DAVID2 baptiste.david@esiea.fr
Publikováno v:
ACM Computing Surveys. Nov2020, Vol. 52 Issue 6, p1-28. 28p.
Autor:
Gruber, Jan, Freiling, Felix
Publikováno v:
Datenschutz und Datensicherheit - DuD; May2022, Vol. 46 Issue 5, p284-290, 7p